### [CVE-2024-56654](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56654) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=a0bfde167b506423111ddb8cd71930497a40fc54%3C%200108132d7d76d884e443d18b4f067cdf2811911b%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_event: Fix using rcu_read_(un)lock while iteratingThe usage of rcu_read_(un)lock while inside list_for_each_entry_rcu isnot safe since for the most part entries fetched this way shall betreated as rcu_dereference: Note that the value returned by rcu_dereference() is valid only within the enclosing RCU read-side critical section [1]_. For example, the following is **not** legal:: rcu_read_lock(); p = rcu_dereference(head.next); rcu_read_unlock(); x = p->address; /* BUG!!! */ rcu_read_lock(); y = p->data; /* BUG!!! */ rcu_read_unlock(); ### POC #### Reference No PoCs from references. #### Github - https://github.com/cku-heise/euvd-api-doc - https://github.com/oogasawa/Utility-security